-
9
Scientific, nautical, surveying, photographic, cinematographic, optical, weighing, measuring, signalling, checking (supervision), life-saving and teaching apparatus and instruments; apparatus and instruments for conducting, switching, transforming, accumulating, regulating or controlling electricity; apparatus for recording, transmission or reproduction of sound or images; magnetic data carriers, recording discs; automatic vending machines and mechanisms for coin-operated apparatus; cash registers, calculating machines, data processing equipment and computers; fire-extinguishing apparatus.
computer software for security certification and accreditation, network security testing and evaluation, vulnerability analysis and rectification, malicious code analysis, and security risk assessment and security process automation; computer hardware and peripherals; portable computers; computer workstations comprising computer hardware; computer networking products, namely, computer servers, peripherals and computer software for data communication between application programs, data management and data integration; e-commerce software to allow users to perform business transactions via a global computer network; computer software for others engaged in e-commerce, namely, software for business process automation and service management, system and network health monitoring, automated employee job scheduling and notification, remote monitoring of systems and workstations, automated delivery of software, automated scanning and monitoring of hardware and software inventory assets, and inventory management of physical hardware and network assets; computer software to allow users to engage in e-commerce, namely, software for providing security certification and accreditation support, and software for security policy and operational procedure development; computer software for administration of computer networks, namely, software for automated cross-platform data backup and recovery, and cross-platform user administration from a single computer console; software for computer systems security architecture design and implementation, computer network security testing and evaluation, computer systems vulnerability analysis and rectification, malicious code analysis, and computer network security risk assessment; computer software to allow users to visually represent and manipulate data sets in a touch optimized environment; all of the foregoing in the fields of information assurance, information security, cyber security, operational security, data analytics, visualization, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and enterprise risk management
-
37
Building construction; repair; installation services
computer hardware maintenance services for others
-
38
Telecommunications
telecommunications services, the providing of connections to existing information technology utilizing wired and wireless technology, namely, the electronic transmission of voice, video, data, facsimile, electronic messages, mail and live video conversations, conferencing and communications and information through personal computers, the global computer network, devices interfacing with local and wide area networks, and consulting services concerning data communications and network access, all of the foregoing in the fields of information assurance, information security, cyber security, operational security, data analytics, visualization, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and enterprise risk management
-
42
Scientific and technological services and research and design relating thereto; industrial analysis and research services; design and development of computer hardware and software
information technology services, namely, computer consulting services in the fields of computer security, computer network security, and electronic data security; development, design, integration and installation of computer software, computer systems and networks; computer systems analysis; testing, analysis and evaluation of information technology systems and networks of others for the purposes of enabling organizations to make risk-based security authorization decisions and ensuring that such systems and networks comply with government and industry standards; computer software design for others; all of the foregoing in the fields of information assurance, information security, cyber security, operational security, data analytics, visualization, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and enterprise risk management
-
45
Legal services; security services for the protection of property and individuals; personal and social services rendered by others to meet the needs of individuals
consulting services concerning the management of user identity and access to a computer network in the fields of information assurance, information security, cyber security, operational security, data analytics, visualization, secure wireless networking and secure mobility, identity management, secure message handling, secure lan data integration, and enterprise risk management